Abstract: Classification of Persian printed numeral characters
has been considered and a proposed system has been introduced. In
representation stage, for the first time in Persian optical character
recognition, extended moment invariants has been utilized as
characters image descriptor. In classification stage, four different
classifiers namely minimum mean distance, nearest neighbor rule,
multi layer perceptron, and fuzzy min-max neural network has been
used, which first and second are traditional nonparametric statistical
classifier. Third is a well-known neural network and forth is a kind of
fuzzy neural network that is based on utilizing hyperbox fuzzy sets.
Set of different experiments has been done and variety of results has
been presented. The results showed that extended moment invariants
are qualified as features to classify Persian printed numeral
characters.
Abstract: The objective of this study is to investigate the effect of adding coal to obtain insulating ceramic product. The preparation of mixtures is achieved with 04 types of different masse compositions, consisting of gray and yellow clay, and coal. Analyses are performed on local raw materials by adding coal as additive. The coal content varies from 5 to 20 % in weight by varying the size of coal particles ranging from 0.25mm to 1.60mm.
Initially, each natural moisture content of a raw material has been determined at the temperature of 105°C in a laboratory oven. The Influence of low-coal content on absorption, the apparent density, the contraction and the resistance during compression have been evaluated. The experimental results showed that the optimized composition could be obtained by adding 10% by weight of coal leading thus to insulating ceramic products with water absorption, a density and resistance to compression of 9.40 %, 1.88 g/cm3, 35.46 MPa, respectively. The results show that coal, when mixed with traditional raw materials, offers the conditions to be used as an additive in the production of lightweight ceramic products.
Abstract: Camera calibration is an important step in 3D
reconstruction. Camera calibration may be classified into two major types: traditional calibration and self-calibration. However, a calibration method in using a checkerboard is intermediate between traditional calibration and self-calibration. A self
is proposed based on a square in this paper. Only a square in the planar
template, the camera self-calibration can be completed through the single view. The proposed algorithm is that the virtual circle and straight line are established by a square on planar template, and
circular points, vanishing points in straight lines and the relation
between them are be used, in order to obtain the image of the absolute
conic (IAC) and establish the camera intrinsic parameters. To make
the calibration template is simpler, as compared with the Zhang Zhengyou-s method. Through real experiments and experiments, the experimental results show that this algorithm is
feasible and available, and has a certain precision and robustness.
Abstract: Massive use of places with strong tourist attraction
with the consequent possibility of losing place-identity produces
harmful effects on cities and their users. In order to mitigate this risk,
areas close to such places can be identified so as to widen the
visitor-s range of action and offer alternative activities integrated
with the main site. The cultural places and appropriate activities can
be identified using a method of analysis and design able to trace the
identity of the places, their characteristics and potential, and to
provide a sustainable improvement. The aim of this work is to
propose PlaceMaker as a method of urban analysis and design which
both detects elements that do not feature in traditional mapping and
which constitute the contemporary identity of the places, and
identifies appropriate project interventions. Two final complex maps
– the first of analysis and the second of design – respectively
represent the identity of places and project interventions. In order to
illustrate the method-s potential; the results of the experimentation
carried out in the Trevi-Pantheon route in Rome and the appropriate
interventions to decongest the area are illustrated.
Abstract: According to the new developments in the field of information and communication technologies, the necessity arises for active use of these new technologies in education. It is clear that the integration of technology in education system will be different for primary-higher education or traditional- distance education. In this study, the subject of the integration of technology for distance education was discussed. The subject was taken from the viewpoint of students. With using the information of student feedback about education program in which new technological medias are used, how can survey variables can be separated into the factors as positive, negative and supporter and how can be redesigned education strategy of the higher education associations with the examining the variables of each determinated factor is explained. The paper concludes with the recommendations about the necessitity of working as a group of different area experts and using of numerical methods in establishing of education strategy to be successful.
Abstract: People have always needed to believe in some
supernatural power, which could explain nature phenomena.
Different kinds of religions like Christianity, Hinduism, Islam,
Buddhism have thought believers in all world, how to behave
themselves. We think the most important role of religion in modern
society most important role of religion in modern society is safety of
the People. World and traditional religion played a prominent role in
the socio-cultural progress, and in the development of man as a
spiritual being. At the heart of religious morals the belief in god and
responsibility before it lies and specifies religious and ethical values
and categories . The religion is based on ethical standards historically
developed by society, requirements and concepts, but it puts all
social and moral relations of the person in dependence on religious
values. For everything that the believer makes on a debt or a duty, he
bears moral responsibility before conscience, people and god. The
concept of value of religious morals takes the central place because
the religion from all forms of public consciousness most values is
painted as it is urged to answer vital questions. Any religion not only
considers questions of creation of the world, sense of human
existence, relationship of god and the person, but also offers the
ethical concept, develops rules of behavior of people. The religion a
long time dominated in the history of culture, and during this time
created a set of cultural and material values. The identity of Kazakh
culture can be defined as a Cultural identity traditional ,national
identity and the identity values developed by Kazakh people in
process of cultural-historical development, promoting formation of
Kazakh culture identity on public consciousness. Identity is the
historical process but always the tradition exists in it as a component
of stability, as a component of self that what this identity formed .
Abstract: There is inadequate information on the practice of
female genital mutilation (FGM) in the UK, and there are often
myths and perceptions within communities that influence the
effectiveness of prevention programmes. This means it is difficult to
address the trends and changes in the practice in the UK.
To this end, FORWARD undertook novel and innovative research
using the Participatory Ethnographic and Evaluative Research
(PEER) method to explore the views of women from Eritrea, Sudan,
Somalia and Ethiopia that live in London and Bristol (two UK cities).
Women-s views, taken from PEER interviews, reflected reasons for
continued practice of FGM: marriageability, the harnessing and
control of female sexuality, and upholding traditions from their
countries of origin. It was also clear that the main supporters of the
practice were believed to be older women within families and
communities.
Women described the impact FGM was having on their lives as
isolating. And although it was clearly considered a private and
personal matter, they developed a real sense of connection with their
peers within the research process.
The women were overwhelmingly positive about combating the
practice, although they believed it would probably take a while
before it ends completely. They also made concrete
recommendations on how to improve support services for women
affected by FGM: Training for professionals (particularly in
healthcare), increased engagement with, and outreach to,
communities, culturally appropriate materials and information made
available and accessible to communities, and more consequent
implementation of legislation.
Finally, the women asked for more empathy and understanding,
particularly from health professionals. Rather than presenting FGM
as a completely alien and inconceivable practice, it may help for
those looking into these women-s lives and working with them to
understand the social and economic context in which the practice
takes place.
Abstract: Social Business Process Management (SBPM)
promises to overcome limitations of traditional BPM by allowing
flexible process design and enactment through the involvement of
users from a social community. This paper proposes a meta-model
and architecture for socially driven business process management
systems. It discusses the main facets of the architecture such as goalbased
role assignment that combines social recommendations with
user profile, and process recommendation, through a real example of
a charity organization.
Abstract: The Malaysia Highway Authority (MHA) was
established by the Government in 1980 for the purpose of designing,
constructing and maintaining toll highways in Malaysia that include
the North-South Expressway and the Penang Bridge, which were
procured using the publicly-funded traditional procurement. However
following a recession in the mid 80-s, the operations of these tolledhighways
had been privatized to ensure that their operational services
continue through private financing as a result of long-term
concession agreement concurred between the Malaysian Government
and private operators. The change in the contract strategy for
highway projects in Malaysia would have a great tendency to dictate
a significant risk exposure towards the key parties involved,
particularly the Malaysian Government as project principal, unless
operational risks are clearly identified and managed via appropriate
mitigation measures prior to a contract signing.
This research identifies potential operational risks that have a
possibility to occur in highway projects in Malaysia from the
perspective of public sector clients. Since this research focuses on the
operational risks for highway projects in Malaysia, the initial results
acquired from literature review on the operational risks of highway
projects in some Asian countries are then justified by a number of
key individuals from the MHA through interviews. As a result,
among key operational risks that have possibility to occur in the
highway projects in Malaysia include initial toll-tariff decided by the
Government, traffic congestion, change of road network and overloaded
freight transportation, which could cause damage to the road
surface and hence affecting the operation of a particular highway.
Abstract: It is believed that continuously variable transmission (CVT) will dominate the automotive transmissions in the future. The most popular design is Van Doorne-s CVT with single metal pushing V-belt. However, it is only applicable to low power passenger cars because its major limitation is low torque capacity. Therefore, this research studies a novel dual-belt CVT system to overcome the limitation of traditional single-belt CVT, such that it can be applicable to the heavy-duty vehicles. This paper presents the mathematical model of the design and its experimental verification. Experimental and simulated results show that the model developed is valid and the proposed dual-belt CVT can really overcome the traditional limitation of single-belt Van Doorne-s CVT.
Abstract: Having done in this study, air-conditioning
automation for patisserie shopwindow was designed. In the cooling
sector it is quite important to cooling up the air temperature in the
shopwindow within short time interval. Otherwise the patisseries
inside of the shopwindow will be spoilt in a few days. Additionally
the humidity is other important parameter for the patisseries kept in
shopwindow. It must be raised up to desired level in a quite short
time. Traditional patisserie shopwindows only allow controlling
temperature manually. There is no humidity control and humidity is
supplied by fans that are directed to the water at the bottom of the
shopwindows. In this study, humidity and temperature sensors
(SHT11), PIC, AC motor controller, DC motor controller, ultrasonic
nebulizer and other electronic circuit members were used to simulate
air conditioning automation for patisserie shopwindow in proteus
software package. The simulation results showed that temperature
and humidity values are adjusted in desired time duration by openloop
control technique. Outer and inner temperature and humidity
values were used for control mechanism.
Abstract: Software project effort estimation is frequently seen
as complex and expensive for individual software engineers.
Software production is in a crisis. It suffers from excessive costs.
Software production is often out of control. It has been suggested that
software production is out of control because we do not measure.
You cannot control what you cannot measure. During last decade, a
number of researches on cost estimation have been conducted. The
metric-set selection has a vital role in software cost estimation
studies; its importance has been ignored especially in neural network
based studies. In this study we have explored the reasons of those
disappointing results and implemented different neural network
models using augmented new metrics. The results obtained are
compared with previous studies using traditional metrics. To be able
to make comparisons, two types of data have been used. The first
part of the data is taken from the Constructive Cost Model
(COCOMO'81) which is commonly used in previous studies and the
second part is collected according to new metrics in a leading
international company in Turkey. The accuracy of the selected
metrics and the data samples are verified using statistical techniques.
The model presented here is based on Multi-Layer Perceptron
(MLP). Another difficulty associated with the cost estimation studies
is the fact that the data collection requires time and care. To make a
more thorough use of the samples collected, k-fold, cross validation
method is also implemented. It is concluded that, as long as an
accurate and quantifiable set of metrics are defined and measured
correctly, neural networks can be applied in software cost estimation
studies with success
Abstract: Bridge is an architectural symbol in Iran as Badgir
(wind catcher); fire temples and arch are vaults are such. Therefore, from the very old ages, construction of bridges in Iran has mixed with
architecture, social customs, alms and charity and holiness. Since long ago, from Mad, Achaemenid, Parthian and Sassanid times which construction of bridges got an inseparable relation with social dependency and architecture, based on those dependency bridges and
dams got holy names; as Dokhtar castle and Dokhtar bridges were constructed. This method continued even after Islam and whenever
Iranians got free from political fights and the immunity of roads were established the bridge construction did also prospered. In ancient
times bridge construction passes through it growing and completion process and in Sassanid time in some way it reached to the peak of art
and glory; as after Islam especially during 4th. century (Arab calendar) it put behind a period of glory and in Safavid time it
reached to an exceptional glory and magnificence by constructing
glorious bridges on Zayandeh Roud River in Isfahan.
Having a combined style and changeability into bridge barrier, some of these bridges develop into magnificent constructions. The
sustainable structures, mentioned above, are constructed for various
reasons as follows: connecting two sides of a river, storing water,
controlling floods, using water energy to operate water windmills, making lanes of streams for farms- use, and building recreational
places for people, etc. These studies carried in bridges reveals the fact
that in construction and designing mentioned above, lots of
technological factors have been taken into consideration such as
exceeding floods in the rives, hydraulic and hydrology of the rivers and bridges, geology, foundation, structure, construction material, and adopting appropriate executing methods, all of which are being analyzed in this article.
Abstract: The traditional public relations manager is usually responsible for maintaining and enhancing the reputation of the organization among key publics. While the principal focus of this effort is on support publics, it is quite clearly recognized that an organization's image has important effects on its own employees, its donors and volunteers, and its clients. The aim of paper is to define application`s aspects of public relations media and tools by nonprofit organizations in Albanian reality. Actually does used public relations media and tools, like written material, audiovisual material, organizational identity media, news, interviews and speeches, events, web sites by nonprofit organizations to attract donors? If, public relations media and tools are used, does exists a relation between public relation media and fundraising?
Abstract: Knowing about the customer behavior in a grocery has
been a long-standing issue in the retailing industry. The advent of
RFID has made it easier to collect moving data for an individual
shopper's behavior. Most of the previous studies used the traditional
statistical clustering technique to find the major characteristics of
customer behavior, especially shopping path. However, in using the
clustering technique, due to various spatial constraints in the store,
standard clustering methods are not feasible because moving data such
as the shopping path should be adjusted in advance of the analysis,
which is time-consuming and causes data distortion. To alleviate this
problem, we propose a new approach to spatial pattern clustering
based on the longest common subsequence. Experimental results using
real data obtained from a grocery confirm the good performance of the
proposed method in finding the hot spot, dead spot and major path
patterns of customer movements.
Abstract: This paper reports a new pattern recognition approach for face recognition. The biological model of light receptors - cones and rods in human eyes and the way they are associated with pattern vision in human vision forms the basis of this approach. The functional model is simulated using CWD and WPD. The paper also discusses the experiments performed for face recognition using the features extracted from images in the AT & T face database. Artificial Neural Network and k- Nearest Neighbour classifier algorithms are employed for the recognition purpose. A feature vector is formed for each of the face images in the database and recognition accuracies are computed and compared using the classifiers. Simulation results show that the proposed method outperforms traditional way of feature extraction methods prevailing for pattern recognition in terms of recognition accuracy for face images with pose and illumination variations.
Abstract: In this paper, we present an innovative scheme of
blindly extracting message bits from an image distorted by an attack.
Support Vector Machine (SVM) is used to nonlinearly classify the
bits of the embedded message. Traditionally, a hard decoder is used
with the assumption that the underlying modeling of the Discrete
Cosine Transform (DCT) coefficients does not appreciably change.
In case of an attack, the distribution of the image coefficients is
heavily altered. The distribution of the sufficient statistics at the
receiving end corresponding to the antipodal signals overlap and a
simple hard decoder fails to classify them properly. We are
considering message retrieval of antipodal signal as a binary
classification problem. Machine learning techniques like SVM is
used to retrieve the message, when certain specific class of attacks is
most probable. In order to validate SVM based decoding scheme, we
have taken Gaussian noise as a test case. We generate a data set using
125 images and 25 different keys. Polynomial kernel of SVM has
achieved 100 percent accuracy on test data.
Abstract: In this article the homotopy continuation method (HCM) to solve the forward kinematic problem of the 3-PRS parallel manipulator is used. Since there are many difficulties in solving the system of nonlinear equations in kinematics of manipulators, the numerical solutions like Newton-Raphson are inevitably used. When dealing with any numerical solution, there are two troublesome problems. One is that good initial guesses are not easy to detect and another is related to whether the used method will converge to useful solutions. Results of this paper reveal that the homotopy continuation method can alleviate the drawbacks of traditional numerical techniques.
Abstract: In this era of technology, fueled by the pervasive usage of the internet, security is a prime concern. The number of new attacks by the so-called “bots", which are automated programs, is increasing at an alarming rate. They are most likely to attack online registration systems. Technology, called “CAPTCHA" (Completely Automated Public Turing test to tell Computers and Humans Apart) do exist, which can differentiate between automated programs and humans and prevent replay attacks. Traditionally CAPTCHA-s have been implemented with the challenge involved in recognizing textual images and reproducing the same. We propose an approach where the visual challenge has to be read out from which randomly selected keywords are used to verify the correctness of spoken text and in turn detect the presence of human. This is supplemented with a speaker recognition system which can identify the speaker also. Thus, this framework fulfills both the objectives – it can determine whether the user is a human or not and if it is a human, it can verify its identity.
Abstract: The cumulative conformance count (CCC) charts are
widespread in process monitoring of high-yield manufacturing.
Recently, it is found the use of variable sampling interval (VSI)
scheme could further enhance the efficiency of the standard CCC
charts. The average time to signal (ATS) a shift in defect rate has
become traditional measure of efficiency of a chart with the VSI
scheme. Determining the ATS is frequently a difficult and tedious
task. A simple method based on a finite Markov Chain approach for
modeling the ATS is developed. In addition, numerical results are
given.